How to change default ssid and password of wifi i.e. "BeagleBone-xxxx" and "BeagleBone"

Hi,
I used connmanctl to connect with my router, and now even if I am connected with beaglebone-XXXX wifi on any device(mobile , laptop) , I can use internet from my router.It is sweet and nice. I didn’t noticed for hours while working on laptop.

However, it is a potential security risk as anyone who might have knowledge about beaglebone can connect using default password. By now I have tried every search result on google and frustrated enough to overlook any of my stupid mistakes or obvious solutions.

Background:
I got my beaglebone black wireless around 2017, that time I tried very hard but couldn’t put WiFi to work , recently I again took interest in it and therefore from this page (Error using connmanctl> enable wifi BBBW), I found out kernel was damaged somehow in every image I downloaded , and I used this command dd if=/opt/scripts/device/bone/bbbw-eeprom.dump of=/sys/devices/platform/ocp/44e0b000.i2c/i2c-0/0-0050/eeprom and voila! Wifi and bt led which I never noticed on board illuminated.

Following is output for /opt/scripts/tools/version.sh

git:/opt/scripts/:[7cdc270818b76d829d247cf05fe309c320a3929a]

eeprom:[A335BNLTBWA50000BBWG*]

model:[TI_AM335x_BeagleBone_Black_Wireless]

dogtag:[BeagleBoard.org Debian Buster IoT Image 2020-04-06]

bootloader:[eMMC-(default)]:[/dev/mmcblk1]:[U-Boot 2019.04-00002-g07d5700e21]:[location: dd MBR]

UBOOT: Booted Device-Tree:[am335x-boneblack-uboot-univ.dts]

UBOOT: Loaded Overlay:[AM335X-PRU-RPROC-4-19-TI-00A0]

UBOOT: Loaded Overlay:[BB-ADC-00A0]

UBOOT: Loaded Overlay:[BB-BBBW-WL1835-00A0]

UBOOT: Loaded Overlay:[BB-BONE-eMMC1-01-00A0]

UBOOT: Loaded Overlay:[BB-HDMI-TDA998x-00A0]

kernel:[4.19.94-ti-r42]

nodejs:[v10.21.0]

/boot/uEnv.txt Settings:

uboot_overlay_options:[enable_uboot_overlays=1]

uboot_overlay_options:[uboot_overlay_pru=/lib/firmware/AM335X-PRU-RPROC-4-19-TI-00A0.dtbo]

uboot_overlay_options:[enable_uboot_cape_universal=1]

pkg check: to individually upgrade run: [sudo apt install --only-upgrade ]

pkg:[bb-cape-overlays]:[4.14.20200722.0-0~buster+20200722]

pkg:[bb-wl18xx-firmware]:[1.20200702.0-0~buster+20200702]

pkg:[kmod]:[26-1]

pkg:[librobotcontrol]:[1.0.5-git20200715.0-0~buster+20200716]

pkg:[firmware-ti-connectivity]:[20190717-2rcnee1~buster+20200305]

groups:[debian : debian adm kmem dialout cdrom floppy audio dip video plugdev users systemd-journal bluetooth netdev i2c gpio pwm eqep remoteproc admin spi iio docker tisdk weston-launch xenomai cloud9ide]

cmdline:[console=ttyO0,115200n8 bone_capemgr.uboot_capemgr_enabled=1 root=/dev/mmcblk1p1 ro rootfstype=ext4 rootwait coherent_pool=1M net.ifnames=0 lpj=1990656 rng_core.default_quality=100 quiet]

dmesg | grep remote

[ 56.564542] remoteproc remoteproc0: wkup_m3 is available

[ 56.803677] remoteproc remoteproc0: powering up wkup_m3

[ 56.803711] remoteproc remoteproc0: Booting fw image am335x-pm-firmware.elf, size 217168

[ 56.803984] remoteproc remoteproc0: remote processor wkup_m3 is now up

[ 58.894162] remoteproc remoteproc1: 4a334000.pru is available

[ 58.911225] remoteproc remoteproc2: 4a338000.pru is available

dmesg | grep pru

[ 58.894162] remoteproc remoteproc1: 4a334000.pru is available

[ 58.894350] pru-rproc 4a334000.pru: PRU rproc node pru@4a334000 probed successfully

[ 58.911225] remoteproc remoteproc2: 4a338000.pru is available

[ 58.915782] pru-rproc 4a338000.pru: PRU rproc node pru@4a338000 probed successfully

dmesg | grep pinctrl-single

[ 0.958066] pinctrl-single 44e10800.pinmux: 142 pins, size 568

dmesg | grep gpio-of-helper

[ 0.971160] gpio-of-helper ocp:cape-universal: ready

lsusb

Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

END

I tried this solution without any success

Please check the below steps for changing the SSID and Password for the Beaglebone :

Step: 1 – > Get the latest updates

BeagleBone Black Rev C:

cd /opt/scripts/tools/
./update_kernel.sh

BeagleBone and BeagleBone Black Rev A/B:

  1. opkg update
  2. opkg upgrade

And then reboot

Step : 2 – > Configure WiFiBeagleBone Black Rev C:

  1. Edit /etc/networking/interfaces

  2. Uncomment the WiFi section and add SSID and password:

auto wlan0

iface wlan0 inet dhcp
wpa-ssid “mySSID”
wpa-psk “mypassword”

BeagleBone and BeagleBone Black Rev A/B, confugure ConnMan:

  1. Verify that you have “[WiFi] Enabled = true” in /var/lib/connman/settings

  2. Add a new file /var/lib/connman/wifi.config with the following content:

[service_home]
Type =wifi
Name = yourSSID
Security = wpa2-psk
Passphrase = yourPassPhrase

(replace “yourSSID” with the name of your network and replace “yourPassPhrase” with your passphrase. If you use wpa (and not wpa2), you must also change “wpa2-psk” to “wpa”.

Restart connman: systemctl restart connman

Also, please clarify how do I know which rev bbb I have(rev A,B or C) ? Does bbbw stands for Beaglebone Black wireless, because I stupidly confused it with beaglebone white?

The factory defaults are set in:

/etc/default/bb-wl18xx

Inside that file, there are few variables you can change along with
just disabling it..

Regards,

Hi
There is an issue with BeagleBone AI, bb-wl18xx.When modifieng the USE_PERSONAL_PASSWORD to anything but “BeagleBone” it stop working. The device is not visable any more.
Changing USE_PERSONAL_PASSWORD back to “BeagleBone” then everything is fine again.

Does anyone know how to get around this?

Thanks
Stein

That variable is used like this:

https://github.com/rcn-ee/repos/blob/master/bb-bbai-firmware/suite/bionic/debian/bb-bbai-tether#L53

Without sharing your "personal" passwords.. Are you using any special
characters? That might break my how i utilize the wifi_password
variable in that script..

If you want, please randomize your password, but have those same
special chargers, and i'll test it out locally..

Regards,

Because of our configuration:

wpa=2
wpa_passphrase=${wifi_password}
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP

I think your 3 character password is just too short.. It looks like
we need a minimum of 8 characters for ^ configuration..

Regards,

Thanks for testing, i've documented this for the next user: :wink:

https://github.com/RobertCNelson/bb-wl18xx-firmware/commit/e6aa38f16e836de484227e537029e17b07c3d92f

Regards,

https://www.routersecurity.org/wepwpawpa2.php
"""
The shortest password allowed with WPA2 is 8 characters long. A password of
14 or 15 characters should be long enough to defeat most brute force
guessing. The German government recommends 20 characters as a minimum. WPA2
passwords can be up to 63 characters long. Of course, it is better to
include both upper and lower case letters along with numbers. WPA2
passwords can also contain a host of special characters.
"""